Analysis

  • max time kernel
    126s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 06:39

General

  • Target

    dbffdc8d4c68cca665c0f265547a5f99_JaffaCakes118.html

  • Size

    158KB

  • MD5

    dbffdc8d4c68cca665c0f265547a5f99

  • SHA1

    37558f5b310d449e6241f651c4aec84004315a4f

  • SHA256

    945b11ede29493083a939fbbf75db5cce1e31085c109e2d3f1a2f3276786a11d

  • SHA512

    e73a4e618b34d05e0bfd8b0b161c3427f3394777d5eab4b76725ced34c01ce1f513dd98bc77976d2d31024b43a9f1bdc562466d58da2ffb3c4641a8d3e1ba9fc

  • SSDEEP

    1536:iERTZ2ZiJ0uHhnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:i2cSnyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbffdc8d4c68cca665c0f265547a5f99_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:548
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:3068
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:537613 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      257f2983f7514e90aa626dafe0ceb22a

      SHA1

      2c41dcf0419b5bd5244480e5b2c588d5b8448cf5

      SHA256

      dc3a5337fc27bfeff9e3627411991a4e757560e339dd1dc0ad0f758d1d337fea

      SHA512

      384fb313950705318997bb1dc185b0379f8107c36fe2817dc648f6dab1e8db0f113f516c4cd52880f05f0ca75ff47537bbe551d32063ec8c58f32521f0eb50ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      330fbc39e311d458a4c442ede8d88189

      SHA1

      f10e4c926265ced9ecc6ab35bbdc75f75d6ddc69

      SHA256

      e070cb0cb74e947c4fdb5e5bc5bb7a4d800344715ffb535a0fe19394b5af715e

      SHA512

      0cbed48e4167b5a71d1f7f6b493d737f2beb2f4d9b4c79f50aac1ab48bc80ed88be1faa8aaa7d1079663dac762062197bc3ef4b4bdcad35680941f25ce6020a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9c33e6c33923e2cf15af3a4e0d81cd11

      SHA1

      bed5738a8507a2c7b4881c35ac9cc5a22a297f97

      SHA256

      312378338294c489ee3fc376fe9132095112b440505046be26938cae4c8133b7

      SHA512

      b71450c06c83cd094e647b2240ce0f31fb76b0428e6599a767cf5319267abb4d2859bf900d375d204c16a895f60bc3136fd50a1accecf88e1eec35350900addb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f6878fe10204f36d99668768ee786a56

      SHA1

      044deefe8dc9fb2898e0c0e9207119c09532cfbd

      SHA256

      91b693a5288b9bd61235cc3f4f92c29bb047c84248082f15400bb1c05c573c74

      SHA512

      133874189a631adda07bf939a457dca5e815facd1555c5682f699d7138cd1efe124d062494c1d5c9a569f68b8c8e65bdd585183fc9fea0201250197dbf406bd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c5f07765efa92a747e883b00b0503e13

      SHA1

      dee87fe756c46cc0efab2c5d7b625c2bdd39b66f

      SHA256

      acb025f0d405bdaaed0f0459d1779d7f73f14295963e7b5a2de7f425614219ce

      SHA512

      3ef7de5f42082ffbdc4c764089c63310b45db519ea520815edd114cf252853a93f0f97f62523b26728bf4392c37db6435f55ca11900da9d04a676042b13ea9be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4488ef3444db06d87386b414171b85dc

      SHA1

      5cb7f089b6b27a83dd2240695ded3dd7b3d5b39e

      SHA256

      3093436112e28e4a785f44020d0221e63130834ef587a6f54db57d44e6a35e64

      SHA512

      cae790b086dfd87cf87b5602ec799b97bf1bdfc2452d4343d3c507ed8f561d9044e35c3bf715444efeb4d6411aee6f505923ce5aa8260c5931e5609861a13062

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1b6b413147bc3ffa241b03d23f4524c

      SHA1

      e629a2ea2d3c40e3dedd3d70f5b1df1fc3c3c1f9

      SHA256

      d749253da4d093f8d23ca9756cee888cd0819d8ccd4b2bd6646215e03850304b

      SHA512

      1f5ee78c14429bbf43fc55d56caed71eda747589e81ec5d1a6f491df2859b307162df40108cf53c6ac3c1419314b7b7305ece0fba8a7a2742973d76c7aa2cbfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      446b680972ed35bcb1f2892546de57c3

      SHA1

      33fec4d29d3c8aa8dc7aa66654976b42697058ca

      SHA256

      c13fc0ce4d4897442500dd5bd69f1934c9f24e09a71207ef9b180cad87eb3a3e

      SHA512

      2275fe73979109ecc77ceb9bdc699748473d6e09d3f9e7af524d67ec2ce892ef244a9fffde648fd767fb8635ad2738aaf9d4252b98c3d47474228e268d8d6fd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      597123a57547f9343e546dabd2140720

      SHA1

      cd7e2d1fd3843284b4307cf4e7c47dd76479673d

      SHA256

      351a2f0c71db9589986f7aada89d59d4948efbefff71fc4f1c1ea6c0a4ca3b0f

      SHA512

      f4a4cb70680466fd2eec809241e3b7539bddf2f08967074cc2f7e0faaad89d4f1a703f57d4e29df79374bd55f02f07b890fd85a8004e5801a5a81202e4f9ee97

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f2d0e83d31e1ca16e801b5effd1b5cf7

      SHA1

      f736355f686d1a4eb88eaccbc76ca7d03e5ce6bd

      SHA256

      9a7c128cf3218e7df670788df3a63cef85cca091a18e304a92f21957dce87c24

      SHA512

      3a15a3ddc4d03e7cddbec07f3eb4588e0dcc16b8fb57436628cd87fa4bda3628ab4b6c23084824549245e607bca95712fa2ed711d449af6be8b3280970334949

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb9da47eb337cd163f07c0c0607b0d17

      SHA1

      793d538316e9b44505d267841193f5a97c8561dc

      SHA256

      ca61d3f01ac85571d14744bf00d12eb4d9bac07dba49f4cb80075244d37c47a6

      SHA512

      1f0390503f42fff9f49158c7e5310f1b661af3a1463f4c402568a55b5b14d8059b5c91e40215e2240ceb090906c06579cbf253ac8bbf1c2f995199dd61c2be01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      351acb3872a7cbeedfe2bbf7a2d55d38

      SHA1

      d6337d903826c2fd1c1bdf9b13701f254d5438c3

      SHA256

      bf96a01636bb04a21a3a0c807e85d345704b30fa82da0b0ad7e506d39bc0da89

      SHA512

      7f8fdea8c96cb6b0e7af36be19c023ed65dd2d87b7b1edc1848167dfac2593cb776ec738f932557c1a57f649ef7e84e79ac6fd74b786f678b7eb74c338f90f80

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      76299a27f2d582fb1cb7f204efd3f8be

      SHA1

      7a705f6420ef3bd7f9775eaf89e56e9bc17cd8ca

      SHA256

      235b0bfa51f6a16f50d17ca4e07c077d71915c8791ef52a53abef5fed3a4d103

      SHA512

      de98d555a97219ef2a205399eb1f30ae668576995f96f0d998df20c0c23b471e51a3b7b1d9518acb5fcb88903c11bd5760481007b9daa745b3898a4f716be3b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      23241eb3adf468ad5a7232645e6c7e3d

      SHA1

      60c84a5a0154cf452e4a387e935dd67a78647741

      SHA256

      ccb133d243198431d5ae1bc11c4023d2677e6108d237a9528e46747b3271d0b6

      SHA512

      b89862741a6a4f7de8c451141d624ee3a8aa90087eac8822762c3945bc96ea7084627aa0832813b2e0faaafa834de5235d8d8e9a1055da01eaa06f90c63381bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      41a0b75b307122c0f27c40e2290c733d

      SHA1

      f2a91caf692139723d764cd798a277684caa0b1f

      SHA256

      76613c038da2a0bebe368d322c9e39451d75b7c9e9532421c0d38f13ac3e941e

      SHA512

      f52ca190c5625fd59f3aad91bed4187fb727c721ba739fdcbe95b3e5f71926f7fa71cd272b0f0a9bda918c44d2b9c78d06b8db0b3dfda7e293b6d736ae2a7afd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      718a5c18926acbf9d7560923e242a351

      SHA1

      a48d3786f57e017b4cedd4a2a99dae1637b163a7

      SHA256

      69d004ba140a9397bd17e825d5444d907222a2b712bab874f318103dce90a12f

      SHA512

      1869f879fc6af39ac67ce33e9aa14f161e335945dbe7eeef55aaa26420ed8d4c02a9f24412fd63ee844d1b1802821fbe6d28be3e86f00d2a493e9060d41dbaea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8e8bb50c17ab5a831f132451b8e838ee

      SHA1

      5e9c40f9755689af3d32ded678496cbc50ab7deb

      SHA256

      0bba30029c4ef00f5a012bb17fd7b3ac6c02d0abe26f3341d6d8187a462afff0

      SHA512

      e7e8451faeaa272f05007cc206aeda30dd5c85532c858e8eae0549d864489f0accd695172d658a4a4e0c5e8411a53d63e911ff474298ac91828c51cbed28319d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1919a741e56ced346fc63b92daff9ec9

      SHA1

      8ba3980030360cbe8198babb576d94828e77be02

      SHA256

      458b62ce9965b53ccf6a3ea680e1b586d5484cf54a6033640d14b5cbc3b9d3d0

      SHA512

      f713ecfbc0cc8380b1ac47939ebceeacc7930da421e464df63c807bc3ff1c4e9a16b28355d4e21280b9927d16a0d09c57f718154e55abec7f52743aa6d455406

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2d9bd9e4b73322d44541148394809423

      SHA1

      260c7388b556f4211cff286dec1cd7b2161e9f12

      SHA256

      5d9513272e72823113766f7af552a2988cae52d76e7be877578a4240ef5b5e31

      SHA512

      60665066c77b2dd40bb7e273b3a841cf7c4247d90d4117ad7ab73f6e3533cbd256b9dc830db80481836adc3cb53c05e782b45d47026e045bdee4b49691d0b2be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      485e857bcd6a1a1dfb38291b139934b3

      SHA1

      6f0ed2c4e934c9e0d63076eb3bf904dafc9528dc

      SHA256

      de6c89622bba6d06dd0510cab31bcefc77d56db8ee797e6945180e23e41110cf

      SHA512

      93214c955e15a40c3a224d40dcba9e670ad59e7c715111e141dc5558224bb0ada902a1a2a4a91bca0ef6d2419c8e57b8e97358929ad039196972637b9e06797f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      44fcccd397a56f6e1e86fc7531c7f047

      SHA1

      c133265946399b4493c83d8d95599badbcb23605

      SHA256

      813a97f21ae3845094899f03caadd795acb511dd268282de9f90bd717351977e

      SHA512

      8545e758b4d3abcfbdaa8f295ad551486a90e003128bddf5ca82346c63ccfafc5e44e1e3ec53a22d1c052290a44bbe04cd4bf156812faf38332063a104730573

    • C:\Users\Admin\AppData\Local\Temp\Cab41C3.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar4224.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/548-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/548-448-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/548-451-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/548-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/548-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/548-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2500-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2500-436-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/2500-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB